aboutsummaryrefslogtreecommitdiff
path: root/lang/node
Commit message (Collapse)AuthorAge
* node: bump to v16.17.0Hirokazu MORIKAWA2022-08-23
| | | | | | | | | | | | | | | | Notable Changes: Experimental command-line argument parser API Experimental ESM Loader Hooks API Experimental test runner Improved interoperability of the Web Crypto API Dependency updates: Updated Corepack to 0.12.1 Updated ICU to 71.1 Updated npm to 8.15.0 Updated Undici to 5.8.0 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: July 7th 2022 Security ReleasesHirokazu MORIKAWA2022-07-10
| | | | | | | | | | | | | | | | Update to v16.16.0 Release for the following issues: HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding (Medium)(CVE-2022-32213) HTTP Request Smuggling - Improper Delimiting of Header Fields (Medium)(CVE-2022-32214) HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding (Medium)(CVE-2022-32215) DNS rebinding in --inspect via invalid IP addresses (High)(CVE-2022-32212) https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/ No vulnerabilities related with openssl (uses system openssl) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to v16.15.1Hirokazu MORIKAWA2022-06-09
| | | | | | | Upgrade npm to 8.11.0 Suppressed unnecessary builds. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to v16.15.0Hirokazu MORIKAWA2022-05-31
| | | | | | | | Description: Update from v16.15.0 Changed handling of host's npm problems due to npm updates. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: Major update from v14 to v16Hirokazu MORIKAWA2022-04-16
| | | | | | | | This update also changes npm from v6 to v8. This change also requires node module packages to be modified. Each package will be updated later. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: January 10th 2022 Security ReleasesHirokazu MORIKAWA2022-01-24
| | | | | | | | | | | | Update to v14.18.3 January 10th 2022 Security Releases: Improper handling of URI Subject Alternative Names (Medium)(CVE-2021-44531) Certificate Verification Bypass via String Injection (Medium)(CVE-2021-44532) Incorrect handling of certificate subject and issuer fields (Medium)(CVE-2021-44533) Prototype pollution via console.table properties (Low)(CVE-2022-21824) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to 14.18.2Hirokazu MORIKAWA2021-12-10
| | | | | | | Update to v14.18.2 Remove unneeded c-ares patches Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to 14.18.1 / October 12th 2021 Security ReleasesHirokazu MORIKAWA2021-10-14
| | | | | | | | October 12th 2021 Security Releases: HTTP Request Smuggling due to spaced in headers (Medium)(CVE-2021-22959) HTTP Request Smuggling when parsing the body (Medium)(CVE-2021-22960) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to 14.17.4Hirokazu MORIKAWA2021-07-31
| | | | | | | | | | July 2021 Security Releases: Use after free on close http2 on stream canceling (High) (CVE-2021-22930) Node.js is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption, to change process behavior. You can read more about it in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22930 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to 14.17.1Hirokazu MORIKAWA2021-06-18
| | | | | | | | Notable Changes: deps: update ICU to 69.1 (Michaël Zasso) errors: align source-map stacks with spec (Benjamin Coe) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: Reduce node-npm package sizeHirokazu MORIKAWA2021-05-28
| | | | | | Reduce package size by about 1MB. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to v14.17.0Hirokazu MORIKAWA2021-05-13
| | | | | | | | | Notable Changes: Diagnostics channel (experimental module) UUID support in the crypto module Experimental support for AbortController and AbortSignal Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: Resolve ICU conflictHirokazu MORIKAWA2021-04-21
| | | | | | | | Resolve conflicts between OpenWrt's ICU package and the ICU shipped with node.js. https://github.com/openwrt/packages/issues/15437 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to v14.16.1Hirokazu MORIKAWA2021-04-11
| | | | | | | | | | | April 2021 Security Releases - OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High) (CVE-2021-3450) - OpenSSL - NULL pointer deref in signature_algorithms processing (High) (CVE-2021-3449) - npm upgrade - Update y18n to fix Prototype-Pollution (High) (CVE-2020-7774) OpenSSL-related vulnerabilities do not affect the OpenWrt package. Because OpenWrt's OpenSSL shared library has been updated. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: #14983 NODEJS_ICU_SMALL is defaultRobin Rainton2021-04-11
| | | | Signed-off-by: Robin Rainton <robin@rainton.com>
* node: bump to v14.16.0Hirokazu MORIKAWA2021-02-26
| | | | | | | | | | | Update to v14.16.0 February 2021 Security Releases - HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion (Critical) (CVE-2021-22883) - DNS rebinding in --inspect (CVE-2021-22884) - OpenSSL - Integer overflow in CipherUpdate (CVE-2021-23840) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: make hostpkg icu-enabledHirokazu MORIKAWA2021-02-17
| | | | | | | Made the necessary changes to build the latest version of adguardhome. See this thread : https://github.com/openwrt/packages/pull/14717 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v14.15.5Hirokazu MORIKAWA2021-02-12
| | | | | | | | Description: Update to v14.15.5 upgrade npm to 6.14.11 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v14.15.4Hirokazu MORIKAWA2021-01-11
| | | | | | | | January 2021 Security Releases: use-after-free in TLSWrap (High) (CVE-2020-8265) HTTP Request Smuggling in nodejs (Low) (CVE-2020-8287) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v14.15.3Hirokazu MORIKAWA2020-12-24
| | | | | | | | | | | Maintainer: me @ianchi Compile tested: head r15324-920b692, aarch64, x86_64 Run tested: (qemu 5.2.0) aarch64, x86_64 Description: Update to v14.15.3 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v14.15.1Hirokazu MORIKAWA2020-12-10
| | | | | | Update to v14.15.1 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v12.20.0Hirokazu MORIKAWA2020-11-27
| | | | | | | Update to v12.20.0 Take over maintainership from John Crispin Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v12.19.0Hirokazu MORIKAWA2020-11-08
| | | | | | | Update to v12.19.0 Fixes for the removal of MIPS FPU emulator support. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v12.18.4Hirokazu MORIKAWA2020-09-16
| | | | | | | | | | Vulnerabilities fixed: * CVE-2020-8201: HTTP Request Smuggling due to CR-to-Hyphen conversion (High). * CVE-2020-8252: fs.realpath.native on may cause buffer overflow (Medium). Imported patches from the debian package. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v12.18.3Hirokazu MORIKAWA2020-07-30
| | | | | | | | | | | | upgrade npm to 6.14.6 update openssl to 1.1.1g Vulnerabilities fixed: * CVE-2020-8172: TLS session reuse can lead to host certificate verification bypass (High). * CVE-2020-11080: HTTP/2 Large Settings Frame DoS (Low). * CVE-2020-8174: napi_get_value_string_*() allows various kinds of memory corruption (High). Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: Change icu version specificationHirokazu MORIKAWA2020-03-24
| | | | | | modify host icu library path Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v12.16.1Hirokazu MORIKAWA2020-02-21
| | | | | | | | Add some new APIs V8 was updated to 7.8.279.23. This includes performance improvements to object destructuring, RegExp match failures and WebAssembly startup time. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: update to v12.15.0Hirokazu MORIKAWA2020-02-06
| | | | | | | | Update to v12.15.0 Support Python3 : https://github.com/openwrt/packages/issues/8893 Preparing to deprecate nosnapshot builds. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: fix http/2 DoSHirokazu MORIKAWA2019-08-16
| | | | | | | | | | | This is a security release. Node.js, as well as many other implementations of HTTP/2, have been found
vulnerable to Denial of Service attacks. See https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md for more information. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: fix host build error on macOSHirokazu MORIKAWA2019-08-01
| | | | | | | | | | fix host build error on macOS reference: https://github.com/openwrt/packages/issues/9616 Related: https://github.com/openwrt/packages/issues/7171 (This correspondence is necessary to build with macOS.) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: add mips64 supportHirokazu MORIKAWA2019-05-10
| | | | | | | | see: https://github.com/openwrt/packages/pull/8796 And remove uclibc depends Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: don't build on unsupported cpus, remove menuEneas U de Queiroz2019-04-26
| | | | | | | Node does not support arc or armeb systems. Moved i18 option to straight under node instead of on its own menu. Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
* node: update to 8.16.0Hirokazu MORIKAWA2019-04-19
| | | | | | Update to v8.16.0 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: support ppc32 muslHirokazu MORIKAWA2019-04-15
| | | | | | | support powerpc32 musl https://downloads.openwrt.org/snapshots/faillogs/powerpc_464fp/packages/node/compile.txt Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to 8.15.1Hirokazu MORIKAWA2019-04-11
| | | | | | | | Several security fixes: Node.js: Slowloris HTTP Denial of Service with keep-alive (CVE-2019-5737) OpenSSL: 0-byte record padding oracle (CVE-2019-1559) Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: Update to 8.14.1Rosen Penev2018-12-24
| | | | | | | | Mainly CVE fixes. Added a patch to fix compilation without deprecated OpenSSL APIs. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* node: use system libnghttp2 libuv libhttp-parserEneas U de Queiroz2018-12-24
| | | | | | Use the openwrt system libraries instead of the ones bundled with node. Signed-off-by: Eneas U de Queiroz <cote2004-github@yahoo.com>
* node: Update to 8.12.0Rosen Penev2018-11-14
| | | | | | | | Fixes several CVEs. Added PKG_CPE_ID for proper CVE tracking. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* node: bump to 8.11.3Hirokazu MORIKAWA2018-07-03
| | | | | | | Update to v8.11.3 Several security fixes: CVE-2018-7167, CVE-2018-7161, CVE-2018-1000168,CVE-2018-7158, CVE-2018-7159, CVE-2018-7160 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: Fix incorrect detection of arm_version and arm_fpuHirokazu MORIKAWA2018-05-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Automatic detection of the arm architecture does not work well. http://downloads.lede-project.org/snapshots/faillogs/arm_arm1176jzf-s_vfp/packages/node/compile.txt ``` ../deps/v8/src/arm/assembler-arm.cc:176:2: error: #error "CAN_USE_ARMV7_INSTRUCTIONS should match CAN_USE_VFP3_INSTRUCTIONS" #error "CAN_USE_ARMV7_INSTRUCTIONS should match CAN_USE_VFP3_INSTRUCTIONS" ^~~~~ ``` https://github.com/openwrt/packages/issues/5728 Explicitly set cpu arch optimization flag to the compiler option so that "configure" script correctly identifies "arm version". (Raspberry Pi Zero W) Raspbian: ``` raspberrypi:~ $ echo | gcc -dM -E - | grep ARM_ARCH ``` OpenWrt (cross-env): ``` ubuntu:~ $ echo | ./arm-openwrt-linux-muslgnueabi-gcc -dM -E - | grep ARM_ARCH ``` ``` ubuntu:~ $ echo | ./arm-openwrt-linux-muslgnueabi-gcc -mcpu=arm1176jzf-s -dM -E - | grep ARM_ARCH ``` Also specifying an option lines compactly. Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: fix host build failHirokazu MORIKAWA2018-05-16
| | | | | | | | | | modify patch. https://github.com/nodejs/node/pull/19196 made not to use libressl headers fix to include path not to use "host/include" Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: bump to 8.10.0Marko Ratkaj2018-03-10
| | | | | | | | | | | | | | Changes: Version bump to 8.10.0 Refreshed patches Added npx install Added 004-node_crypto-remove-std.patch Additional patch fixes node_cypto compile failure: ./src/node_crypto.cc:5626:32: error: expected unqualified-id before '(' Signed-off-by: Arturo Rinaldi <arty.net2@gmail.com> Signed-off-by: Marko Ratkaj <marko.ratkaj@sartura.hr>
* node: depends on availability of fpuYousong Zhou2018-02-09
| | | | | | | | | | | | | | | | | | | It requires either hardware or software emulated fpu, otherwise program can fail with SIGILL for fp instructions emitted by the JIT compiler See #1937, #2633, #2442, FS#1257 for details From code snippet at deps/v8/src/mips/constants-mips.h #elif(defined(__mips_soft_float) && __mips_soft_float != 0) // This flag is raised when -msoft-float is passed to the compiler. // // Although FPU is a base requirement for v8, soft-float ABI is used // // on soft-float systems with FPU kernel emulation. // const bool IsMipsSoftFloatABI = true; [1] https://bugs.chromium.org/p/v8/issues/detail?id=4704 Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* node: delete unnecessary TAB characters at the end of a lineHirokazu MORIKAWA2017-09-11
| | | | Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: fix typoHirokazu MORIKAWA2017-09-07
| | | | | | https://github.com/openwrt/packages/issues/4742 Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
* node: fix path patchAdrian Panella2017-08-17
| | | | Signed-off-by: Adrian Panella <ianchi74@outlook.com>
* node: bump version and add maintainerAdrian Panella2017-08-16
| | | | Signed-off-by: Adrian Panella <ianchi74@outlook.com>
* node: bump version and tweak configAdrian Panella2017-08-16
| | | | | | | | Bump version to 6.11.0 Add ICU dependency when using i18n Tweak fpu configs Signed-off-by: Adrian Panella <ianchi74@outlook.com>
* node: Move NPM into a separated pacakgeYgal Blum2017-04-06
| | | | | | | | | In order to reduce flash requirements and also to disallow running NPM on the target move NPM out of the default NodeJS package. In order to allow adding NPM via opkg install, move it to a separated directory Signed-off-by: Ygal Blum <ygal.blum@gmail.com>
* treewide: replace $(STAGING_DIR)/host and $(HOST_BUILD_PREFIX) with ↵Matthias Schiffer2017-01-10
| | | | | | | | | | | | | | | | | | $(STAGING_DIR_HOSTPKG) As both LEDE and OpenWrt have STAGING_DIR_HOSTPKG now, we can start to rely on it. See 73b7f55424de52d8179a9ad808252fe3bf8dcc9d for more information on STAGING_DIR_HOSTPKG. STAGING_DIR_HOSTPKG won't actually be changed before the first LEDE release (it is equivalent to $(STAGING_DIR)/host), so this simple search/replace cleanup is safe to apply. Doing this cleanup now will be useful for the Gluon project (an OpenWrt/LEDE based firmware framework) for experimenting with modifying STAGING_DIR_HOSTPKG before doing this in the LEDE upstream. Also fixes a typo in the dbus Makefile ("STAGIND_DIR"). Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>